Analysis

  • max time kernel
    153s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 17:17

General

  • Target

    ad17a237f56e5f17dbf28526a65a3b012ee485f438269ec8a77b28f4dea36e17.exe

  • Size

    88KB

  • MD5

    d7f99c959af347ab2fb359501e6e16c8

  • SHA1

    6de9846953a3ee357cf903aa82896ab6965bfa35

  • SHA256

    ad17a237f56e5f17dbf28526a65a3b012ee485f438269ec8a77b28f4dea36e17

  • SHA512

    335c97f978ef5cbc7a14cc0168b0bbd632eccadc982e8aaaac09c587aecfbc7a929e16324e208de2730aec09443c46136e57ca6aceb15b12518794791fa7c5ee

  • SSDEEP

    1536:jqoOa4m91rqN9WBe4/RhxWEYRbBtesI3i6EDX:GM4m91rhoWW5X

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad17a237f56e5f17dbf28526a65a3b012ee485f438269ec8a77b28f4dea36e17.exe
    "C:\Users\Admin\AppData\Local\Temp\ad17a237f56e5f17dbf28526a65a3b012ee485f438269ec8a77b28f4dea36e17.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\xeeosu.exe
      "C:\Users\Admin\xeeosu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeeosu.exe

    Filesize

    88KB

    MD5

    2dbfdbd81464f60da32a89175b230b09

    SHA1

    a7b5ae72e6c7f5ee3b14051f5ff517058db1e9ce

    SHA256

    4c1f4b830e929d1971292aff693113a7b3169b04d4eee931d08f9ccacee97188

    SHA512

    da513626c5994266844ec398f74ba6aa63e5189933411307002339258ab00c72df2c1842c4187936e30cd36bed3723086c4739d349914ea5bebd5fbfd30759de

  • C:\Users\Admin\xeeosu.exe

    Filesize

    88KB

    MD5

    2dbfdbd81464f60da32a89175b230b09

    SHA1

    a7b5ae72e6c7f5ee3b14051f5ff517058db1e9ce

    SHA256

    4c1f4b830e929d1971292aff693113a7b3169b04d4eee931d08f9ccacee97188

    SHA512

    da513626c5994266844ec398f74ba6aa63e5189933411307002339258ab00c72df2c1842c4187936e30cd36bed3723086c4739d349914ea5bebd5fbfd30759de

  • \Users\Admin\xeeosu.exe

    Filesize

    88KB

    MD5

    2dbfdbd81464f60da32a89175b230b09

    SHA1

    a7b5ae72e6c7f5ee3b14051f5ff517058db1e9ce

    SHA256

    4c1f4b830e929d1971292aff693113a7b3169b04d4eee931d08f9ccacee97188

    SHA512

    da513626c5994266844ec398f74ba6aa63e5189933411307002339258ab00c72df2c1842c4187936e30cd36bed3723086c4739d349914ea5bebd5fbfd30759de

  • \Users\Admin\xeeosu.exe

    Filesize

    88KB

    MD5

    2dbfdbd81464f60da32a89175b230b09

    SHA1

    a7b5ae72e6c7f5ee3b14051f5ff517058db1e9ce

    SHA256

    4c1f4b830e929d1971292aff693113a7b3169b04d4eee931d08f9ccacee97188

    SHA512

    da513626c5994266844ec398f74ba6aa63e5189933411307002339258ab00c72df2c1842c4187936e30cd36bed3723086c4739d349914ea5bebd5fbfd30759de

  • memory/1676-56-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB